Back to Browse

PicoCTF filtered-shellcode Binary Exploitation challenge walkthrough - assembly execve in 32-bit.

98 views
Sep 5, 2025
12:27

pico ctf filtered shellcode pwn challenge writeup, write custom assembly to call execve("/bin/sh", 0, 0) and avoid NOP slides in x86. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 🔥 𝗪𝗔𝗧𝗖𝗛 𝗧𝗜𝗟𝗟 𝗧𝗛𝗘 𝗘𝗡𝗗 🔥 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ If you enjoyed this video... 👀 👍 Like the video 🔔 Subscribe to the channel 💬 Comment your thoughts below 📤 Share with your friends! ⚡ Your support keeps the hammer swinging! 🦆🔨 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 📱 𝗙𝗢𝗟𝗟𝗢𝗪 𝗠𝗘 𝗛𝗘𝗥𝗘 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 🐥 Twitter/X: @w3th4nds 🔗 LinkedIn: https://www.linkedin.com/in/thanos-sarridis/ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 🍺 Beer or Coffee ☕? https://buymeacoffee.com/w3th4nds ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 🧠 What did you think of the video? Drop your opinion or 🔥 emoji in the comments! 👀 Watching but not subscribed? 👉 Hit that [🔴 SUBSCRIBE] button now & don’t miss a thing! Chapters: 0:00 Intro 0:28 AAAAAAA 0:45 Protections 1:06 DDDDDDD 1:10 Identify the bug 1:52 x86 syscall table 2:36 Theory 4:08 Crafting the exploit - Clear registers 5:00 Craft & Shift "/bin/sh\0" inside registers 9:37 Push "/bin/sh\0" on the stack 10:32 Prepare for syscall 11:11 Failed attempt 1 11:32 Failed attempt 2 11:34 Success

Download

0 formats

No download links available.

PicoCTF filtered-shellcode Binary Exploitation challenge walkthrough - assembly execve in 32-bit. | NatokHD